Harness Engineer

v5.3.0

A persistent autonomous engineering harness runtime that transforms any repository into a self-improving software system. Use this skill whenever the user wa...

4· 421·4 current·4 all-time
byLouis Szeto@louis-szeto
Security Scan
Capability signals
CryptoCan make purchases
These labels describe what authority the skill may exercise. They are separate from suspicious or malicious moderation verdicts.
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
The skill is an instruction-only 'harness' for running multi-agent engineering cycles. It requests no binaries, env vars, or installs and all declared tool usage (read_file, write_file, git_*, web_search, test runners) matches the stated purpose of transforming repositories and orchestrating agents. The extensive protected-path and router requirements are appropriate for a harness.
Instruction Scope
SKILL.md and supporting docs instruct agents to read repo files, run tests, create branches/PRs, and spawn subagents. These are within the declared purpose, but they assume the platform enforces a central tool router, sandboxed test execution, scoped git credentials, and human approval gates. If the host platform does not implement those enforcement points, the instructions could enable risky autonomous behavior. The skill repeatedly warns to verify platform requirements before use.
Install Mechanism
Instruction-only; no install spec, no downloads, and no code execution packaged with the skill. This minimizes on-disk footprint and avoids installing arbitrary binaries.
Credentials
The skill declares no required environment variables, no credentials, and no config paths. It explicitly instructs the platform to manage scheduler credentials and git tokens and forbids writing credentials to memory or logs. The requested environment access is proportionate to an orchestration/instruction-only skill.
Persistence & Privilege
always:false (not force-included). Model invocation/autonomous invocation is allowed (platform default). This is expected for an autonomous harness, but because the skill orchestrates actions that can modify a repo (commits/PRs, tests, staging docs) users must ensure platform-enforced human gates, tool-routing, and git scoping are present. The skill itself repeatedly mandates human approval gates and protected paths.
Assessment
This skill is a documentation-driven orchestration runtime (no code bundled) and is internally consistent with its purpose. It delegates all enforcement to the host platform — before enabling autonomous runs, verify the platform actually provides: (1) a tool router that blocks protected-path writes, redacts secrets, and logs BLOCKED_READ/BLOCKED_WRITE events; (2) sandboxed test execution with no access to host env vars or harness files; (3) fine‑grained git credentials scoped to the current repo and branch protections (no direct push to main); and (4) human approval gates for plan/PR/critical actions. If you cannot confirm those controls, run the skill only in single-pass/manual mode and do not enable continuous/autonomous operation. Because the skill can orchestrate commits, tests, and subagents, lack of platform enforcement increases the risk of unwanted changes or data exposure — ensure you test the harness in a safe repository first and confirm logs and redaction behavior before trusting it with production repos.

Like a lobster shell, security has layers — review code before you run it.

latestvk978vkbdppj8qw1gz23y9kg5ph84gdcw
421downloads
4stars
17versions
Updated 1w ago
v5.3.0
MIT-0

HARNESS ENGINEER

A production-grade skill for Claude Code and OpenClaw that transforms a repository into a self-improving software system using six core harness engineering principles.


SIX CORE PRINCIPLES

P1: CONTEXT ENGINEERING

Treat context as a finite, precious resource. Curate aggressively. See: runtime/context-engineering.md, runtime/compaction.md

P2: TOOL USAGE

Each sub-agent receives only the tools it needs -- no more. See: tools/TOOL_REGISTRY.md, references/mcp-tools.md

P3: VERIFICATION MECHANISM

Every output is verified by someone other than who produced it. See: agents/reviewer.md, references/testing-standards.md

P4: STATUS MANAGEMENT

State lives outside the context window, in the repo. See: runtime/status-management.md, templates/handoff.md

P5: OBSERVABILITY AND FEEDBACK CLOSED-LOOP

Track what happens. Feed failures back into the harness, not the code. See: runtime/observability.md, runtime/memory-system.md

P6: HUMAN SUPERVISION

Humans approve high-impact events. The harness surfaces them explicitly. See: runtime/autonomy-rules.md, runtime/prioritization.md


NON-NEGOTIABLE RULES

  1. CLAUDE.md / AGENTS.md IS GROUND TRUTH -- read it first, every session.
  2. CODEBASE OVER DOCS -- when they conflict, trust the code.
  3. 40% CONTEXT RULE -- compact or sub-agent before crossing 40% of context window.
  4. NO IMPLEMENTATION WITHOUT a research output, a plan, and validation criteria.
  5. GENERATION AND REVIEW ARE ALWAYS SEPARATE -- never the same agent.
  6. FAILURE = HARNESS GAP -- fix the harness, not just the symptom.
  7. OPTIMIZATION PRIORITY: Security => Correctness => Reliability => Performance => Memory => Maintainability => Cost
  8. MINIMAL SCOPE PER SUBAGENT — Estimate codebase size first (use platform file-count or line-count capability — never raw shell). If >5K lines, split into multiple subagents by module/feature/layer. Pin exact files to read (no wandering). One research doc + one code area per subagent max. If a subagent gets killed or times out, the scope was too large — split further. Adaptive timeouts: Default timeouts are guidelines, not hard kills. Check process logs before killing — if the agent is actively producing output, extend the timeout instead of killing. Only kill-and-split if the agent is silent/stuck for >10min or producing garbage. Scale timeouts by effort: S-effort=15min, M-effort=20min, L-effort=30-40min.
  9. SUBAGENT PERMISSION MODE — Subagents are spawned by the platform using its native agent mechanism. The permission mode is set by the platform, NOT by this skill. The skill MUST NOT mandate any specific spawn command or permission mode — that decision belongs to the platform's enforcement layer (see PLATFORM_REQUIREMENTS.md Section 8). If the platform's default permission mode is insufficient, the platform operator configures it — the skill never overrides it.
  10. ACTIVE MONITORING — Every time you launch a new batch of subagents, track session IDs, expected output files, and remaining queue. If the platform provides a cron/scheduler, use it to detect dead agents. If no scheduler is available, check agent status before each dispatch step. Dead agents stall the pipeline — detect them early.
  11. MAX PARALLEL = 5 — Up to 5 Claude Code agents running simultaneously. If rate/API limit errors encountered, drop to 4, then 3, etc until no errors. Resume increasing after 5 clean minutes.
  12. TOKEN EXHAUSTION RECOVERY: If ALL active agents hit rate/API limits (429/500), tokens are exhausted. Wait for token refresh before retrying. If the platform provides a scheduler, set a recovery job to resume after refresh. If no scheduler is available, the human operator must manually restart the cycle.
  13. 10-MIN STUCK KILL — If any agent produces no output for >10 minutes, log the issue, kill it, and split the task into smaller subtasks before respawning. MUST ALWAYS set a cron job when a subagent is given a command that will run for a while, to periodically check on its progress.
  14. TRACKING EVERYWHERE — Every phase, cycle, and step writes to tracking logs. DISPATCH-TRACK, error log, compact summaries, progress logs. Recovery must be able to pick up from any interruption point.

SAFE START GUIDE

Before anything else: read PLATFORM_REQUIREMENTS.md and verify every item. The harness depends on platform enforcement that cannot be checked from these files alone.

Step 1 -- Verify platform requirements (PLATFORM_REQUIREMENTS.md) Run through the five platform capability checks before any other step.

Step 2 -- Sandbox first Run on a throwaway branch. Observe one single-pass cycle before enabling continuous mode.

Step 2 -- Review CONFIG.yaml before every run | loop_mode | single-pass | Change after sandbox validation | | max_parallel_agents | 3 | Increase after confirming behavior | | block_destructive... | true | Never change |

PRs always require human approval. There is no auto-merge.

Step 3 -- Protect main branch Require human reviewers on main/trunk in your git host.

Step 4 -- Graduation path: single-pass => maintenance => continuous


HOW TO USE THIS SKILL

When activated in Claude Code or OpenClaw, read in this order:

  1. CLAUDE.md or AGENTS.md if present (base context)
  2. CONFIG.yaml (runtime settings)
  3. runtime/loop.md (execution model)
  4. runtime/context-engineering.md (context budget rules)
  5. runtime/status-management.md (restore checkpoint if resuming)
  6. MEMORY.md (prior failure context)
  7. agents/dispatcher.md (task decomposition model, worktree agent)
  8. Begin the loop

REFERENCE FILES

FileWhen to read
CLAUDE.md / AGENTS.mdFirst, every session -- base knowledge
CONFIG.yamlAt startup
MEMORY.mdAt startup and after every failure
runtime/loop.mdEach loop cycle
runtime/context-engineering.mdContinuously -- governs context budget
runtime/compaction.mdWhen compacting context within a phase
runtime/status-management.mdAt startup (resume) and after each task
runtime/observability.mdAfter VERIFY phase
runtime/memory-system.mdWhen writing or querying memory
runtime/self-improvement.mdAfter any failure
runtime/prioritization.mdWhen selecting the next task
runtime/autonomy-rules.mdWhen blocked or at human gate
agents/dispatcher.mdBefore decomposing any task (worktree agent)
agents/researcher.mdResearch phase (Q-Agent + R-Agent model)
agents/planner.mdPlan phase (3-phase: design, outline, master plan)
agents/implementer.mdImplement phase (worktree-driven execution)
agents/reviewer.mdReview cycle
agents/debugger.mdOn any failure
agents/optimizer.mdOptimization mode
agents/garbage-collector.mdGC interval
tools/TOOL_REGISTRY.mdBefore any tool call
tools/tool-router.mdRouting and redaction rules
tools/execution-protocol.mdFull tool call lifecycle
references/harness-rules.mdCore constraints
references/testing-standards.mdBefore writing or running tests
references/security-performance.mdBefore any implementation
references/simplification-checklist.mdDuring review and refactoring
references/git-workflow.mdBefore any commit or PR
references/mcp-tools.mdMCP tool definitions and per-agent sets
references/sensitive-paths.mdForbidden read paths -- enforced in-skill
references/constraints.mdActive prevention rules
templates/Plans, ADRs, handoffs, status docs

Comments

Loading comments...